Windows 7 deprecation
Windows 7 will be removed from tria.ge on 2025-03-31
Analysis
-
max time kernel
143s -
max time network
150s -
platform
windows10-2004_x64 -
resource
win10v2004-20240226-en -
resource tags
arch:x64arch:x86image:win10v2004-20240226-enlocale:en-usos:windows10-2004-x64system -
submitted
18/03/2024, 14:41
Static task
static1
Behavioral task
behavioral1
Sample
d3c30a0eae56673d073fb5b5a2f3c62c.exe
Resource
win7-20240221-en
General
-
Target
d3c30a0eae56673d073fb5b5a2f3c62c.exe
-
Size
64KB
-
MD5
d3c30a0eae56673d073fb5b5a2f3c62c
-
SHA1
ddef40f396f1a9c29677404d70596dff625ef909
-
SHA256
b2d4457f7d9c5bce541982a0dfce52d05088e1e7be2b07d87e32b98b1d456c3b
-
SHA512
a9c74ef35462eebff781a638d6a7b666135fdc8eff026de327fce18dc506211a59014f46b96de6b7744fbf2468d1ebd7846356f19e6cf47ec5e008ff7b10607b
-
SSDEEP
768:dDJLpNn7eE9kyXDOiYKpMttNa9E4uVeRt6c/LjsrGeunHeuWYjGtcZfdZ0Xv1aeJ:VVp+enSN+AVeLDjs6ucLZ0Xv1ouZsvV
Malware Config
Signatures
-
Checks computer location settings 2 TTPs 1 IoCs
Looks up country code configured in the registry, likely geofence.
description ioc Process Key value queried \REGISTRY\USER\S-1-5-21-3808065738-1666277613-1125846146-1000\Control Panel\International\Geo\Nation d3c30a0eae56673d073fb5b5a2f3c62c.exe -
Executes dropped EXE 1 IoCs
pid Process 2284 HRY6HMMFD3Wmsi.exe -
description ioc Process Key value queried \REGISTRY\MACHINE\SOFTWARE\Microsoft\Windows\CurrentVersion\Policies\System\EnableLUA d3c30a0eae56673d073fb5b5a2f3c62c.exe -
Drops file in Windows directory 3 IoCs
description ioc Process File opened for modification C:\Windows\RMXP1XMG.exe d3c30a0eae56673d073fb5b5a2f3c62c.exe File created C:\Windows\HRY6HMMFD3Wmsi.exe d3c30a0eae56673d073fb5b5a2f3c62c.exe File created C:\Windows\RMXP1XMG.exe d3c30a0eae56673d073fb5b5a2f3c62c.exe -
Enumerates physical storage devices 1 TTPs
Attempts to interact with connected storage/optical drive(s).
-
Suspicious use of SetWindowsHookEx 7 IoCs
pid Process 1088 d3c30a0eae56673d073fb5b5a2f3c62c.exe 1088 d3c30a0eae56673d073fb5b5a2f3c62c.exe 1088 d3c30a0eae56673d073fb5b5a2f3c62c.exe 1088 d3c30a0eae56673d073fb5b5a2f3c62c.exe 1088 d3c30a0eae56673d073fb5b5a2f3c62c.exe 2284 HRY6HMMFD3Wmsi.exe 2284 HRY6HMMFD3Wmsi.exe -
Suspicious use of WriteProcessMemory 3 IoCs
description pid Process procid_target PID 1088 wrote to memory of 2284 1088 d3c30a0eae56673d073fb5b5a2f3c62c.exe 98 PID 1088 wrote to memory of 2284 1088 d3c30a0eae56673d073fb5b5a2f3c62c.exe 98 PID 1088 wrote to memory of 2284 1088 d3c30a0eae56673d073fb5b5a2f3c62c.exe 98
Processes
-
C:\Users\Admin\AppData\Local\Temp\d3c30a0eae56673d073fb5b5a2f3c62c.exe"C:\Users\Admin\AppData\Local\Temp\d3c30a0eae56673d073fb5b5a2f3c62c.exe"1⤵
- Checks computer location settings
- Checks whether UAC is enabled
- Drops file in Windows directory
- Suspicious use of SetWindowsHookEx
- Suspicious use of WriteProcessMemory
PID:1088 -
C:\Windows\HRY6HMMFD3Wmsi.exe"C:\Windows\HRY6HMMFD3Wmsi.exe" wb2⤵
- Executes dropped EXE
- Suspicious use of SetWindowsHookEx
PID:2284
-
-
C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe"C:\Program Files (x86)\Microsoft\Edge\Application\msedge.exe" --type=utility --utility-sub-type=asset_store.mojom.AssetStoreService --lang=en-US --service-sandbox-type=asset_store_service --no-appcompat-clear --mojo-platform-channel-handle=4156 --field-trial-handle=2280,i,11703952675008463361,17436195144517971517,262144 --variations-seed-version /prefetch:81⤵PID:4740
Network
MITRE ATT&CK Enterprise v15
Replay Monitor
Loading Replay Monitor...
Downloads
-
Filesize
28KB
MD5abac1aafcb93bf0f111b670cad5531a0
SHA1ae5addd9dfe4f0fe4ebe8fa82250631ffe529b60
SHA2567009aec1d769bae1e0f900f0ba7922785e2f645be9d1f52c93e030395313d68d
SHA512cf5bece7df80b9d721a0df6271181aea7717edb312a4f1b9cb1634d90394edff1327d6c34ba7e1e0f7f206971150a369fb18120a18e396bd1f8a8c087e945a15